Week 03-A Student Version
Week 03-A Student Version
Contingency planning..
WHAT IS INFORMATION SECURITY?
• Security can be defined as the degree of protection against criminal
activity, danger, damage and/or loss.
1. Confidentiality;
2. Integrity;
3. Availability.
Threat .
Exposure.
Vulnerability.
© Sebastian/Age Fotostock America, Inc.
Examples of common security threats:
◦ virus, hacker, cybercrime, poor
management, human error, lack of
knowledge/awareness.
FIVE FACTORS THAT INCREASE RISK
1. Today’s interconnected, interdependent, wirelessly-networked business
environment.
© © Laggerbomber-
Dragonian/iStockph Fotolia.com
oto
© PhotoEdit/Alamy
Limited
DECREASING SKILLS NEEDED TO HACK
Readily accessible tools make it easy to attack a network.
© Wavebreakmedia Ltd/Age
Fotostock America Ltd
HUMAN ERRORS
• Carelessness with laptops and portable computing devices;
• Email scams:
• Nigerian Scam; Phishing Scams.
Information extortion.
Sabotage or vandalism.
Techniques include:
• Stealing mail or ‘dumpster diving’ (i.e. search someone rubbish bins for Bills or
Receipts);
• Stealing personal information from databases;
• Utilising ‘insider’ access to an organisation’s information resources;
• Impersonating a trusted organisation in an email communication (i.e. Phishing).
Recovery:
• Victim's reputation is severely compromised;
• Costly, time consuming and difficult to re-establish bona fides (i.e. identity doc’s)
and gain trust for credit, loans, insurance, jobs and community status.
DELIBERATE THREATS
Compromises to electronic property and assets:
• Intellectual property;
• Trade secret;
• Patent;
• Trademark;
• Copyright;
• Piracy.
INFORMATION SYSTEM THREATS
Software attacks:
• Virus - is a segment of computer code that performs malicious actions by attaching
to another computer program.
• Worm - is a segment of computer code that spreads by itself and performs
malicious actions without requiring another computer program.
• Trojan horse - is a software program that hides in other computer programs and
reveal its designed behaviour only when it is activated.
• Logic Bomb - is a segment of computer code that is embedded within program that
is designed to activate and perform a destructive action at a certain time and date.
• Spyware - collects personal information about users without their consent.
• Spamware - is alien software that uses your computer as a SPAM launchpad.
• Cookies - are small amounts of information that Web sites store on your
computer.
RISK MANAGEMENT
Risk:
• Risk management;
• Risk analysis.
Risk Mitigation:
• Acceptance;
• Limitation;
• Transference.
Auditing:
• Around the computer © Youri van der Schalk/Age
• Through the computer Fotostock America Inc.
Physical Controls:
• Guards, Fences, Gates and Locks.
Communication Controls:
• Firewalls;
• Anti-malware systems;
• Whitelisting and Blacklisting;
• Encryption;
• VPN, SSL and Employee monitoring systems.
WHERE CONTROLS ARE LOCATED
BASIC FIREWALL CONFIGURATIONS
COMMUNICATION CONTROLS
Encryption:
• Converting an original message into a form that can only be read by the intended receiver.
• Public key encryption (asymmetric encryption).
• Digital certificate.
TO DO’s
Revision and develop your lecture notes for exam preparation.
Pre-read and attempt this week’s Tutorial.
• Come to class prepared to ask and answer questions.
• Start writing your assignment NOW.